CVE-2020-9900Link Following in Apple Macos

CWE-59Link Following7 documents4 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 84.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22
Latest updateMay 24

Description

An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A local attacker may be able to elevate their privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages9 packages

CVEListV5apple/tvosunspecifiedtvOS 13.4.8
NVDapple/tvos< 13.4.8
CVEListV5apple/macosunspecifiedmacOS Catalina 10.15.6
NVDapple/ipados< 13.6
CVEListV5apple/watchosunspecifiedwatchOS 6.2.8

🔴Vulnerability Details

2
GHSA
GHSA-24hp-jpqm-m2j2: An issue existed within the path validation logic for symlinks2022-05-24
CVEList
CVE-2020-9900: An issue existed within the path validation logic for symlinks2020-10-22

📋Vendor Advisories

4
Apple
CVE-2020-9900: watchOS 6.2.82020-07-15
Apple
CVE-2020-9900: iOS 13.6 and iPadOS 13.62020-07-15
Apple
CVE-2020-9900: tvOS 13.4.82020-07-15
Apple
CVE-2020-9900: macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra2020-07-15
CVE-2020-9900 — Link Following in Apple Macos | cvebase